General
-
Target
Test.exe
-
Size
494KB
-
Sample
240701-m1apys1arq
-
MD5
d91cf2ea58f9f71046b8f55eb7032640
-
SHA1
649d5eff015dd35f3c29193bf2c4d86a9ad2517b
-
SHA256
e620d6139593cb75beef54843dfca504b864f03a112bb1ece037ea2779a08452
-
SHA512
518904cbeb378f122becc870f164643c2f0849f659b538462666158c0b0a151a5cd5f11213b84cdde3377d23d3f5275304cb7c47e408c18766749d00e31b8a9a
-
SSDEEP
12288:loZ0L+EP8xx7vKInDAmZMK7bCP/dDhA/Nfg:gI837vKInDAmZMK7bCPVlA/Nfg
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1257273081182031882/S0f5S9J9F-zbhHDQlGlLhI6bgnP5WbUyKC9IXiZfUV5WJ7V1L7zhio2udcHS4IhuFInt
Targets
-
-
Target
Test.exe
-
Size
494KB
-
MD5
d91cf2ea58f9f71046b8f55eb7032640
-
SHA1
649d5eff015dd35f3c29193bf2c4d86a9ad2517b
-
SHA256
e620d6139593cb75beef54843dfca504b864f03a112bb1ece037ea2779a08452
-
SHA512
518904cbeb378f122becc870f164643c2f0849f659b538462666158c0b0a151a5cd5f11213b84cdde3377d23d3f5275304cb7c47e408c18766749d00e31b8a9a
-
SSDEEP
12288:loZ0L+EP8xx7vKInDAmZMK7bCP/dDhA/Nfg:gI837vKInDAmZMK7bCPVlA/Nfg
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-